Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Businesses

Submission + - Half Life of a Tech Worker is 15 Years 1

Hugh Pickens writes writes: "Matt Heusser writes that when he went to work for Google all the people he met had a sort of early-twenties look to them. "Like the characters in Microserfs, these were “firstees”, young adults in the middle of the first things like life: First job out of college, first house, first child, first mini-van," writes Heusser. "This is what struck me: Where were the old dudes?" and then he realized something very important — you get fifteen years. "That is to say, your half-life as a worker in corporate America is about age thirty-five. Around that time, interviews get tougher. Your obligations make you less open to relocation, the technologies on your resume seem less-current, and your ability find that next gig begins to decrease." By thirty-five, half the folks who started in technology have gone on to something else — perhaps management, consulting, on to roles in “the business” or in operations. "Yet a few stick it out. Half of the half-life is fifty, and, sure, perhaps 25% of the folks who started as line technologists will still be doing that when they turn fifty," adds Heusser. "But by the time you turn thirty-five, you’d better have a plan.""

Comment New Screen (Score 3, Interesting) 133

If they are not replacing the screen, just the board, then I think they are wasting their time. Based on how awkward the FreeRunner is with regards to the shape and size of the screen (480x640), they will never be able to compete with any recent Android or iPhone model.

Since they stated it will be using the same case, they are really limiting how much they can do for the FreeRunner.

Apple

Submission + - iPhone 4 burns up in Brazil (networkworld.com)

alphadogg writes: It's hard to imagine the Apple iPhone getting any hotter, but a report out of Brazil says that an iPhone 4 short-circuited and burned up next to an owner's bed. The iPhone Blog reported that an iPhone user awoke to the sparking, smoking iPhone near the bed. The incident took place just a few days before an Australian airline had to extinguish an iPhone 4 that began glowing red and smoking during a flight.
http://www.networkworld.com/news/2011/112811-exploding-iphone-253507.html

Comment Re:Depends on the machine (Score 1) 261

The downside of this approach is the risk of data leaking onto the unencrypted volume, through temporary files, swap space, browser caches, files inadvertantly saved in the wrong place and so-on.

That's 100% correct if you need plausible deniability, and it is why TrueCrypt recommends using a "Hidden Operating System" or mounting from a live-cd for this kind of protection. While scripting all of what you said above is possible, if you miss one small thing then you can lose your plausible deniability.

If you just want to protect the data and the names of files don't matter, then there are a finite number of places on windows you could clean via scripts out that would clean up any temporary files laying around.

Comment Re:iPad with a keyboard? (Score 3, Informative) 425

I like the Zagg case that has a keyboard in it.

For taking notes, I like notability, because you can type and draw with a stylus. Also, if you record audio, it can sync up with the drawing/notes you took. This feature is great if you want to listen to the context of the lecture based on your notes.

The Internet

Don't Let Your Boss Catch You Reading This 368

Stony Stevenson writes "iTnews is running a piece on the culture of cyberslacking in the business arena. Studies worldwide suggest employees spend about a fifth of their work shifts engaging in personal activities. Most of that 'wasted time' is, of course, spent online. From the article: 'A recent survey by online compensation firm Salary.com showed about six out of 10 employees in the United States acknowledged wasting time at work. About 34 percent listed personal Internet use as the leading time-wasting activity in the workplace. Employees said they did so because they were bored, worked too many hours, were underpaid or were unchallenged at work. Firms all over the world are concerned about potentially harmful effects of surfing they deem to be inappropriate may have on their company's image.'"
Education

Submission + - Schools Say iPods Becoming Tool for Cheaters

Billosaur writes: "In addition to allowing easy access to audio and video files, add to the list of iPod functionality the ability to cheat on tests. According to CNN, the iPod is the most recent in a long list of tools used by cheaters. Mountain View High School in Meridian, Idaho "recently enacted a ban on digital media players after school officials realized some students were downloading formulas and other material onto the players." Whether loading on audio files containing valuable information or hiding notes in the lyrics files, the newest generation of cheaters has already adapted technology to their needs, forcing school administrators to play catch-up."
Privacy

Submission + - 27B Stroke 6 Blog Taken Down Due to NSA Disclosure

An anonymous reader writes: 27B Stroke 6, the privacy blog by Ryan Singel and Wired News Senior Editor Kevin Poulsen, has been taken down by Typepad.com, before Singel and Poulsen were able to post on the disclosure below. Please consider posting this Slashdot submission for the widest dissemination possible due to the following information:

"The following partial list of IP blocks is routinely used by NSA (supported by private contractors) to gain access to, to monitor, and in some cases, to destroy IT networks. Such activity is related to the US "Terrorist Surveillance Program." Most of the registrants of the blocks listed below are not aware of these activities. Concerned network admins should examine traffic logs closely. A correlation of traffic from several of these IP blocks likely indicates that a network is under surveillance or has had access attempted by the US Government and affiliated entities.

[83.27.0.0 — 83.27.255.255]
[170.86.0.0 — 170.86.255.255]
[62.212.234.128 — 62.212.234.255]
[81.57.102.0 — 81.57.103.255]
[201.5.0.0 — 201.5.255.255]
[213.151.160.0 — 213.151.191.255]
[70.83.15.0 — 70.83.15.255]
[166.128.0.0 — 166.255.255.255]
[60.64.0.0 — 60.159.255.255]
[142.191.0.0 — 142.191.255.255]
[83.65.121.32 — 83.65.121.39]
[12.108.2.0 — 12.108.3.255]
[65.128.0.0 — 65.159.255.255]
[24.158.208.0 — 24.158.223.255]
[86.97.64.0 — 86.97.95.255]
[201.239.128.0 — 201.239.255.255]
[68.36.0.0 — 68.36.255.255]
[70.44.0.0 — 70.44.255.255]
[64.231.200.0 — 64.231.203.255]
[189.128.0.0 — 189.255.255.255]
[216.155.192.0 — 216.155.207.255]
[121.6.0.0 — 121.7.255.255]
[71.96.0.0 — 71.127.255.255]
[190.213.196.0 — 190.213.196.255]
[80.72.230.0 — 80.72.230.255]
[58.29.0.0 — 58.29.255.255]
[121.128.0.0 — 121.191.255.255]
[88.191.3.0 — 88.191.248.255]
[58.72.0.0 — 58.79.255.255]
[70.16.0.0 — 70.23.255.255]
[200.57.192.0 — 200.57.255.255]
[201.5.0.0 — 201.5.255.255]
[124.168.0.0 — 124.168.255.255]
[211.200.0.0 — 211.205.255.255]
[78.252.0.0 — 78.252.255.255]
[59.0.0.0 — 59.31.255.255]
[72.64.0.0 — 72.95.255.255]
[211.200.0.0 — 211.205.255.255]
[145.53.0.0 — 145.53.255.255]
[71.200.0.0 — 71.200.127.255]
[60.206.0.0 — 60.207.255.255]
[194.178.125.48 — 194.178.125.55]
[98.226.0.0 — 98.226.255.255]
[201.88.0.0 — 201.88.255.255]
[205.209.128.0 — 205.209.191.255]

[51.0.0.0 — 51.255.255.255]
[70.64.0.0 — 70.79.255.255]
[70.112.0.0 — 70.127.255.255]
[202.84.96.0 — 202.84.127.255]
[70.32.0.0 — 70.32.31.255]
[207.218.192.0 — 207.218.255.255]
[69.31.88.0 — 69.31.89.255]
[198.74.0.0 — 198.74.255.255]
[221.0.0.0 — 221.3.127.255]
[72.144.0.0 — 72.159.255.255]
[220.96.0.0 — 220.99.255.255]
[82.88.0.0 — 82.91.255.255]
[216.128.73.0 — 216.128.73.255]

216.155.192.0 — 216.155.207.255
86.81.0.0- 86.81.255.255
67.183.0.0 — 67.183.255.255
195.200.203.0 — 195.200.203.255
66.231.176.0 — 66.231.191.255"
Security

Submission + - Hackistan

An anonymous reader writes: This is pretty funny — a security vendor created a campy web site from "Hackistan's" Ministry of Information — www.discoverhackistan.com. Visit Root Kit Pass, etc. Nice timing with the RSA conference. Blogged by Kevin Murphy, too: http://texturbation.com/blog/2007/01/30/hackistan- borat-style-humor-at-rsa/
User Journal

Journal Journal: I am not a lawyer!

If you have been reading slashdot for any amount of time, you know the term IANAL. For those of you who don't know, it means I Am Not A Lawyer, and it is used when someone gives some pathetic attempt at legal advice. A few days ago I saw someone post:

IANAL, but I read a lot of slashdot

Slashdot Top Deals

The most exciting phrase to hear in science, the one that heralds new discoveries, is not "Eureka!" (I found it!) but "That's funny ..." -- Isaac Asimov

Working...